Hi friends, welcome to HackingRoot. Before start learning we must configure our system for performing hacking tasks. Because performing hacking can cause damage your systems too and also its one of the major step for beginners to know which all tools we need to install on our system to learn Hacking.

Below i have provided quick Hacking setup list which will help you to perform Ethical Hacking Lab tasks with ease. So go through them and install below items.

In my previous post I wrote about trojan and how to crate a trojan
server to hack but all famous trojan servers are detected by antivirus
and thus useless. Here i am going to write the method to make your
trojan, keylogger and RAT FUD (fully undetectable) by antivirus
softwares.

BEFORE start practising look this to avoid system damage configure-system-for-hacking.
Prorat a famous Trojan for hacking system, facebook, gmail, yahoo,
twitter and other accounts. Today i will show you step by step guide to
hack with Prorat.

Almost anyone knows how to create a “hidden” folder in Windows, but then again almost anyone knows how to create explorer show invisible folder. Let us take a look at how to create a folder so invisible, only you will know its there.

Most
of the people doesn't like other people checking their personal files
and folder on USB, including me. This insecure situation creates a huge
space to theft our personal data by someone. If you use password
protection to your USB, you can reduce the data theft.